- 1、本文档共28页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
fnd.12.1.ppt
Efficient Group Key Agreement for Dynamic TETRA Networks TETRA Networks What is TETRA? What is TETRA? Architecture TETRA Security Mechanisms TETRA Security Mechanisms Authentication Authentication process Air Interface Keys Key Management Mechanism Over the Air Re-Keying (OTAR) Efficient Group Key Agreement for Dynamic TETRA Networks (AGKA); - Background and Motivation Background and Motivation Group Key Agreement MS communicating over a public, easily- monitored network MS needs to establish a common secret key (session key) to secure communication Group Key Agreement Protocol Background and Motivation Authenticated Group Key Agreement (AGKA) AGKA guarantees security against an active adversary who can modify, insert or remove messages For providing authentication, we can construct AGKA based on PW or signature Background and Motivation In AGKA, there are two concerns with regard to efficiency : Communication and Computation efficiency Communication Efficiency the number and length of messages few rounds Computation Efficiency needs to complete the protocol depends on the cryptographic algorithms Background and Motivation AGKA for Dynamic TETRA networks Provides Setup, Leave and Join Algorithms In a Leave event, removing MS do not know new sk’ Forward Secrecy Background and Motivation AGKA for Dynamic TETRA networks In Join event, joining MS do not know previous sk Backward Secrecy An Efficient Group Key Agreement for Dynamic TETRA Networks (AGKA); - Set up, Join and Leave Algorithms An Efficient AGKA Setup An Efficient AGKA Setup : Group Key Computation Process An Efficient AGKA Setup; Security MS verifies signature of SwMI Assume that a signature scheme is secure All signature cannot be used twice Only MS who knows KEK can compute a group key An adversary can not get any information about a group key from Zi-1,i XOR Encryption Scheme An Efficient AGKA Join Algo. An Efficient AGKA Join ; Security Backward Secrecy Joining MS
您可能关注的文档
- 2006年美赛题(ABC).doc
- 2008年SCI.xls
- 200个骗人的创业项目,希望创业者谨慎投资!.doc
- 2011ssci.doc
- 2011世界大学学术排名500强.xls
- 2012-2013秋冬上海Intertextile面料展--时尚面料.doc
- 2012-2013秋冬慕尼黑面料展---辅料&饰边.doc
- 2012-2面向对象程序设计期末复习模拟题.doc
- 2012华交会家纺趋势分析.doc
- 2012年暑假社会实践活动方案.doc
- 2024年度国家开放大学电大《公共行政学》形考任务辅导资料.docx
- 2024年度(最新)国家开放大学电大本科《公共行政学》形考任务辅导资料(含答案).docx
- 2024国家开放大学电大《公共行政学》形考任务(含答案).docx
- 2024年最新国家开放大学本科《公共行政学》形考任务(含答案).docx
- 2024年最新国开(电大)《公共行政学》形考任务(含答案).docx
- 2024年国开本科《公共行政学》形考任务(含答案).docx
- 2024年最新国家开放大学《公共行政学》形考任务辅导资料及答案.docx
- 2024年度国家开放大学电大本科《公共行政学》形考任务辅导资料(含答案).docx
- 2024年(最新)国开本科《公共行政学》形考任务及答案.docx
- 2024年度(最新)国家开放大学电大《公共行政学》形考任务辅导资料(含答案).docx
文档评论(0)